Image of Prof Qi Shi

Prof Qi Shi

School of Computer Science and Mathematics

Faculty of Engineering and Technology

Email: Q.Shi@ljmu.ac.uk

Telephone: 0151 231 2272

Current Position:

Qi Shi is a Professor in Computer Security, and Director of the PROTECT Research Centre for Critical Infrastructure Computer Technology & Protection.

Research Interests:

Qi Shi’s research is centred on the increasingly important theme of ubiquitous/distributed computing security and privacy with the long-term goal of developing general frameworks for the intelligent provision of security and privacy protection to various applications. Specifically, his main research interests include the following areas:

· System-of-systems security: Develop a software framework for the automated security monitoring, evaluation and control of a system of systems in ubiquitous and cloud computing settings at runtime.

· E-commerce security: Produce methods for privacy enhanced public-key certification and cryptographic protocols for the security and privacy protection of electronic transactions conducted over the Internet.

· Intrusion and denial-of-service detection: Design cost-effective solutions to the early detection and prevention of intrusion and denial-of-service attacks within the network routing infrastructure and in ubiquitous computing environments.

· Sensor network security: Develop resource-efficient algorithms, mechanisms and protocols for key establishment and secure communication among sensor nodes.

· Cloud computing security: Investigate efficient ways for data processing in cloud environments while protecting their security and privacy against unauthorized access.

· Identity management: Devise efficient and lightweight approaches to user-centric and situation-aware identity management for the privacy protection of mobile ad-hoc networks.

· Computer forensics: Propose more effective methods for targeted data collection, uniform data representation, forensic analysis and result visualisation.

Research Publications:

Qi Shi has published over 250 research papers in international journals and conference proceedings.

Research Projects:

Qi Shi is involved in the supervision of a number of research projects in the above research areas. For example, he is one of the investigators of a large EU FP7 project, ANIKETOS, which involves 17 partners in 10 EU countries with a total grant of €9.6 million, for the development of secure and trustworthy composite services.

Research Students:

Qi Shi is supervising a number of international and home research students working in some research areas listed above. He also welcomes prospective research students with interests in the above research areas or others to apply for studies here. Applications can be submitted online at http://www.ljmu.ac.uk/pgapplication/114150.htm.

Other Academic Activities:

Qi Shi is a member of editorial boards and a paper reviewer for a number of international journals and a member or chair of program committees for many international conferences. Qi also serves as an external research degree examiner, taught course examiner and a member of several advisory committees.

Journal article

Hashem Eiza M, Thong Ta V, Shi Q, Cao Y. 2024. Secure Semi-Automated GDPR Compliance Service with Restrictive Fine-grained Access Control Security and Privacy, DOI Publisher Url Public Url

Raschella A, Hashem Eiza M, MacKay M, Shi Q, Banton M. 2023. A Trust-based Cooperative System for Efficient Wi-Fi Radio Access Networks Banton M. IEEE Access, DOI Publisher Url Public Url

Al-Ani R, Shamsa TB, Zhou B, Shi Q. 2023. Privacy and Safety Improvement of VANET Data via a Safety-related Privacy Scheme International Journal of Information Security, DOI Publisher Url Public Url

Alevizos L, Eiza MH, Ta VT, Shi Q, Read J. 2022. Blockchain-enabled Intrusion Detection and Prevention System of APTs within Zero Trust Architecture IEEE Access, 10 :89270-89288 DOI Publisher Url Public Url

Raschella A, Aldhaibani OA, Pizzi S, MacKay M, Bouhafs F, Araniti G, Shi Q, Lucas-Estañ MDC. 2021. A Centralized Win-Win Cooperative Framework for Wi-Fi and 5G Radio Access Networks Wireless Communications and Mobile Computing, 2021 DOI Author Url Publisher Url Public Url

Adewuyi AA, Cheng H, Shi Q, Cao J, Wang X, Zhou B. 2021. SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url

Mohi-Ud-din G, Marnerides A, Shi Q, Dobbins C, MacDermott AM. 2020. Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems IEEE Transactions on Emerging Topics in Computational Intelligence, 5 :860-870 DOI Author Url Publisher Url Public Url

Naureen A, Zhang N, Furber S, Shi Q. 2020. A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking IEEE Access, 8 :102709-102732 DOI Author Url Publisher Url Public Url

Nafea H, Kifayat K, Shi Q, Qureshi KN, Askwith RJ. 2019. Efficient Non-Linear Covert Channel Detection in TCP Data Streams IEEE Access, 8 :1680-1690 DOI Author Url Publisher Url Public Url

Teh PS, Zhang N, Tan SY, Shi Q, Khoh WH, Nawaz R. 2019. Strengthen user authentication on mobile devices by using user’s touch dynamics pattern Journal of Ambient Intelligence and Humanized Computing, DOI Author Url Publisher Url Public Url

Raschella A, Bouhafs F, MacKay M, Shi Q, Ortín J, Gállego JR, Canales M. 2019. A Dynamic Access Point Allocation Algorithm for Dense Wireless LANs Using Potential Game Computer Networks, DOI Author Url Publisher Url Public Url

G C D, Bouhafs F, Raschella A, MacKay M, Shi Q. 2019. Radio Resource Management Framework for Energy-Efficient Communications in the Internet-of-Things Transactions on Emerging Telecommunications Technologies, 30 DOI Author Url Publisher Url Public Url

Mac Dermott AM, Baker T, Buck P, Iqbal F, Shi Q. 2019. The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics International Journal of Digital Crime and Forensics (IJDCF), 12 DOI Publisher Url Public Url

Al-Dahhan R, Shi Q, Lee G, Kifayat K. 2019. Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption Sensors, 19 DOI Author Url Publisher Url Public Url

Bouhafs F, Seyedebrahimi M, Raschella A, MacKay M, Shi Q. 2019. Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs IEEE Transactions on Mobile Computing, DOI Author Url Publisher Url Public Url

Adewuyi AA, Cheng H, Shi Q, Cao J, MacDermott Á, Wang X. 2019. CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url

Zhou B, Maines CL, Tang SOT, Shi Q, Yang P, Yang Q, Qi J. 2018. A 3D Security Modelling Platform for Social IoT Environments IEEE Transactions on Computational Social Systems, 5 :1174-1188 DOI Author Url Publisher Url Public Url

Bouhafs F, MacKay M, Raschella A, Shi Q, den Hartog F, Saldana J, Munilla R, Ruiz-Mas J, Fernández-Navajas J, Almodovar J, van Adrichem N. 2018. Wi-5: A Programming Architecture for Unlicensed Frequency Bands IEEE Communications Magazine, 56 :178-185 DOI Author Url Publisher Url Public Url

Eiza MH, Shi Q, Marnerides AK, Owens T, Ni Q. 2018. Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks IEEE Transactions on Vehicular Technology, DOI Author Url Publisher Url Public Url

Jayasinghe U, Lee GM, Um TW, Shi Q. 2018. Machine Learning based Trust Computational Model for IoT Services IEEE Transactions on Sustainable Computing, 4 :39-52 DOI Author Url Publisher Url Public Url

Asim M, Yautsiukhin A, Brucker A, Baker T, Shi Q, Lempereur B. 2018. Security Policy Monitoring of BPMN-based Service Compositions Journal of Software: Evolution and Process, DOI Author Url Publisher Url Public Url

Moara-Nkwe K, Shi Q, Lee GM, Eiza MH. 2018. A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks IEEE Access, 6 :11374-11387 DOI Author Url Publisher Url Public Url

Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. 2018. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence, 2 DOI Author Url Publisher Url Public Url

Baharon MR, Shi Q, Abdollah MF, Yassin SMWMSMM, Idris A. 2018. An improved fully homomorphic encryption scheme for cloud computing International Journal of Communication Networks and Information Security, 10 :502-508 DOI Publisher Url

Brucker A, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, Validating, and Ranking of Secure Service Compositions Software: Practice and Experience, DOI Author Url Publisher Url Public Url

Zhou B, Zhang Q, Shi Q, Yang Q, Yang P, Yu Y. 2017. Measuring Web Service Security in the Era of Internet of Things Computers and Electrical Engineering, DOI Author Url Publisher Url Public Url

Raschella A, Bouhafs F, Seyedebrahimi M, MacKay M, Shi Q. 2017. Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks IEEE Transactions on Network and Service Management, 14 :441-455 DOI Author Url Publisher Url Public Url

Hashem Eiza M, Ni Q, Shi Q. 2016. Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G Enabled Vehicular Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, DOI Author Url Publisher Url Public Url

Topham L, Kifayat K, Younis Y, Shi Q, Askwith B. 2016. Cyber Security Teaching and Learning Laboratories: A Survey Information & Security: An International Journal, 35 :51-80 DOI Publisher Url

Hashem Eiza M, Owens T, Ni Q, Shi Q. 2015. Situation-Aware QoS Routing Algorithm for Vehicular Ad hoc Networks IEEE Transactions on Vehicular Technology, DOI Author Url Publisher Url Public Url

Shi Q, Zhang N, Merabti M. 2014. Fair signature exchange via delegation on ubiquitous networks Segal M. Journal of Computer and System Sciences, 81 :615-631 DOI Author Url Publisher Url Public Url

Kifayat K, Merabti M, Shi Q, Abbas S. 2013. Component-based security system (COMSEC) with QoS for wireless sensor networks SECURITY AND COMMUNICATION NETWORKS, 6 :461-472 DOI Author Url Publisher Url

Shi Q, Zhang N, Merabti M, Kifayat K. 2013. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 73 :235-249 DOI Author Url Publisher Url

Baharon MR, Shi Q, Llewellyn-Jones D, Merabti M. 2013. Secure Remote Data Processing in Cloud Computing International Journal of Computer Theory and Engineering, :920-923 DOI Publisher Url

Shi Q, Zhang N, Llewellyn-Jones D. 2012. Efficient autonomous signature exchange on ubiquitous networks JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 35 :1793-1806 DOI Author Url Publisher Url

Lempereur B, Merabti M, Shi Q. 2012. Pypette: A platform for the evaluation of live digital forensics International Journal of Digital Crime and Forensics, 4 :31-46 DOI Publisher Url

Shi Q, Zhang N, Merabti M, Askwith R. 2011. Achieving autonomous fair exchange in ubiquitous network settings JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 34 :653-667 DOI Author Url Publisher Url

Shi Q, Zhang N, Merabti M. 2011. Fair exchange of valuable information: A generalised framework JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 77 :348-371 DOI Author Url Publisher Url

Kifayat K, Merabti M, Shi Q. 2010. Future security challenges in cloud computing International Journal of Multimedia Intelligence and Security, 1 :428-428 DOI Publisher Url

Zhou B, Shi Q, Merabti M. 2008. Balancing intrusion detection resources in ubiquitous computing networks COMPUTER COMMUNICATIONS, 31 :3643-3653 DOI Author Url Publisher Url

Zhang N, Shi Q, Merabti M, Askwith R. 2006. Practical and efficient fair document exchange over networks JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 29 :46-61 DOI Author Url Publisher Url

Nenadić A, Zhang N, Shi Q. 2005. RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery Bella G, Ryan P. Journal of Computer Security, 13 :757-777 DOI Publisher Url

Haggerty J, Shi Q, Merabti M. 2005. Early detection and prevention of denial-of-service attacks: A novel mechanism with propagated traced-back attack blocking IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 23 :1994-2002 DOI Author Url Publisher Url

Zhang N, Shi Q, Nenadic A, Merabti M, Askwith R. 2005. Efficient fair digital-signature exchange based on misbehaviour penalisation IEE PROCEEDINGS-COMMUNICATIONS, 152 :257-261 DOI Author Url Publisher Url

Zhang N, Shi Q, Merabti M. 2005. Revocation of privacy-enhanced public-key certificates JOURNAL OF SYSTEMS AND SOFTWARE, 75 :205-214 DOI Author Url Publisher Url

Zhang N, Shi Q, Merabti M, Askwith R. 2004. Autonomous mobile agent based fair exchange COMPUTER NETWORKS, 46 :751-770 DOI Author Url Publisher Url

Zhang N, Shi Q, Merabti M. 2004. A unified approach to a fair document exchange system JOURNAL OF SYSTEMS AND SOFTWARE, 72 :83-96 DOI Author Url Publisher Url

Askwith B, Merabti M, Shi Q. 2003. MNPA: A basis for privacy-enhanced QoS in mobile networks MICROPROCESSORS AND MICROSYSTEMS, 27 :93-100 DOI Author Url Publisher Url

Shi Q, Zhang N, Merabti M. 2003. Signature-based approach to fair document exchange IEE PROCEEDINGS-COMMUNICATIONS, 150 :21-27 DOI Author Url Publisher Url

Zhang N, Shi Q, Merabti M. 2003. An efficient protocol for anonymous and fair document exchange COMPUTER NETWORKS, 41 :19-28 DOI Author Url Publisher Url

Abimbola A, Gresty D, Shi Q. 2002. SubSeven’s Honey Pot Program Network Security, 2002 :10-14 DOI Publisher Url

Askwith B, Merabti M, Shi Q. 2000. MNPA: a mobile network privacy architecture COMPUTER COMMUNICATIONS, 23 :1777-1788 DOI Author Url Publisher Url

Zhang N, Shi Q, Merabti M. 2000. Anonymous public-key certificates for anonymous and fair document exchange IEE PROCEEDINGS-COMMUNICATIONS, 147 :345-350 DOI Author Url Publisher Url

Merabti M, Shi Q, Oppliger R. 2000. Advanced security techniques for network protection COMPUTER COMMUNICATIONS, 23 :1581-1583 DOI Author Url Publisher Url

Zhang N, Shi Q, Merabti M. 1999. A flexible approach to secure and fair document exchange COMPUTER JOURNAL, 42 :569-581 DOI Author Url Publisher Url

Shi Q, Zhang N. 1998. An effective model for composition of secure systems JOURNAL OF SYSTEMS AND SOFTWARE, 43 :233-244 DOI Author Url Publisher Url

Zhang N, Shi Q. 1996. Achieving non-repudiation of receipt COMPUTER JOURNAL, 39 :844-853 DOI Author Url Publisher Url

Conference publication

Hashem Eiza M, Raschella A, MacKay M, Shi Q, Bouhafs F. 2023. Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), IEEE Consumer Communications and Networking Conference (CCNC) DOI Publisher Url Public Url

Younis YA, Kifayat K, Shi Q, Matthews E, Griffiths G, Lambertse R. 2020. Teaching cryptography using CYPHER (InteraCtive CrYPtograpHic Protocol TEaching and LeaRning) ACM International Conference Proceeding Series, DOI Publisher Url

Bouhafs F, den Hartog F, Raschella A, Mackay M, Shi Q, Sinanovic S. 2020. Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability 2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), IEEE Global Communications Conference (GLOBECOM) on Advanced Technology for 5G Plus DOI Author Url Publisher Url

Seyedebrahimi M, Bouhafs F, Raschella A, MacKay M, Shi Q. 2017. Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks IEEE Wireless Communications and Networking Conference (WCNC), IEEE Wireless Communications and Networking Conference (WCNC) DOI Author Url Publisher Url Public Url

Seyedebrahimi M, Raschella A, Bouhafs F, MacKay M, Shi Q, Eiza MH. 2016. A Centralised Wi-Fi Management Framework for D2D Communications in Dense Wi-Fi Networks 2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), IEEE Conference on Standards for Communications and Networking (CSCN) DOI Author Url Publisher Url Public Url

Seyedebrahimi M, Bouhafs F, Raschella A, MacKay M, Shi Q. 2016. SDN-Based Channel Assignment Algorithm for Interference Management in Dense Wi-Fi Networks 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), European Conference on Networks and Communications (EuCNC) DOI Author Url Publisher Url Public Url

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications DOI Publisher Url Public Url

Hashem Eiza M, Shi Q, Marnerides A, Owens T. 2016. Secure and Privacy-Aware Proxy Mobile IPv6 Protocol for Vehicle-to-Grid Networks 2016 IEEE International Conference on Communications (ICC), IEEE International Conference on Communications :1-6 DOI Author Url Publisher Url Public Url

Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2016. A system for intrusion prediction in cloud computing ACM International Conference Proceeding Series, 22-23-March-2016 DOI Publisher Url

Shone N, Dobbins C, Hurst W, Shi Q. 2015. Digital Memories Based Mobile User Authentication for IoT 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) :1796-1802 DOI Author Url Publisher Url Public Url

MacDermott A, Qi Shi , Merabti M, Kifiyat K. 2013. Considering an elastic scaling model for cloud Security 2013 IEEE Third International Conference on Information Science and Technology (ICIST), 2013 IEEE Third International Conference on Information Science and Technology (ICIST) :150-155 DOI Publisher Url

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 DOI Author Url Publisher Url

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 DOI Author Url Publisher Url

Beltran LP, Merabti M, Shi Q. 2012. Multiplayer game technology to manage critical infrastructure protection Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, :549-556 DOI Publisher Url

Kifayat K, Merabti M, Shi Q. 2011. Assets protection in crisis management operations using body area sensor networks Proceedings - International Conference on Computer Networks and Information Technology, :153-157 DOI Publisher Url

Muhammad A, Arabo A, Merabti M, Shi Q, Askwith B. 2010. A secure gateway service for accessing networked appliances Proceedings - 5th International Conference on Systems and Networks Communications, ICSNC 2010, :183-188 DOI Publisher Url

Arabo A, Shi Q, Merabti M. 2010. Data mishandling and profile building in ubiquitous environments Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust, :1056-1063 DOI Publisher Url

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2007. Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol Third International Symposium on Information Assurance and Security, Third International Symposium on Information Assurance and Security :44-49 DOI Publisher Url

Braynov S, Núñez M, Wurman PR, Bravetti M, Cavalli A, Cuartero F, Dignum F, Greenwald A, Hampe F, Hexmoor H, Jurca R, Maamar Z, Miller K, Pousttchi K, Rao HR, Rodríguez I, Rubio F, Shi Q, Zhang N. 2005. Editorial track on E-commerce technologies Proceedings of the ACM Symposium on Applied Computing, 1 :789-790 DOI Publisher Url

Nenadić A, Zhang N, Shi Q, Goble C. 2005. DSA-based verifiable and recoverable encryption of signatures and its application in certified E-goods delivery Proceedings - 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE-05, :94-99 DOI Publisher Url

Nenadić A, Zhang N, Shi Q, Goble C. 2005. Certified E-mail delivery with DSA receipts Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005, 2005 DOI Publisher Url

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2004. A security framework for executables in a ubiquitous computing environment GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, IEEE Global Telecommunications Conference (GLOBECOM 04) :2158-2163 DOI Author Url Publisher Url

Zhang N, Shi Q. 1996. Security issues in an EDI environment Proceedings - Annual Computer Security Applications Conference, ACSAC, :129-136 DOI Publisher Url

Shi Q, McDermid JA. 1993. Constructing secure distributed systems using components :143-151 DOI Publisher Url

Shi Q, McDermid JA, Moffett JD. 1993. Developing secure systems in a modular way COMPASS - Proceedings of the Annual Conference on Computer Assurance, :111-121 DOI Publisher Url

Shi Q, McDermid JA, Moffett JD. 1993. Applying noninterference to composition of systems: A more practical approach Proceedings - Annual Computer Security Applications Conference, ACSAC, :210-220 DOI Publisher Url

McDermid JA, Shi Q. 1992. Secure composition of systems Proceedings - Annual Computer Security Applications Conference, ACSAC, Part F146266 :112-122 DOI Publisher Url

McDermid JA, Shi Q. 1992. A formal approach for security evaluation COMPASS 1992 - Proceedings of the 7th Annual Conference on Computer Assurance, :47-55 DOI Publisher Url

McDermid JA, Shi Q. 1991. A formal model of security dependency for analysis and testing of secure systems Proceedings of the Computer Security Foundations Workshop, :188-200 DOI Publisher Url

Arabo A, Shi Q, Merabti M. Context-Aware Identity Management in Pervasive Ad-hoc Environments The 4th International Workshop on Ubiquitous Computing DOI Publisher Url

Chapters

Hashem Eiza M, Shi Q. 2017. Social Evolving Graph-Based Connectivity Model for Vehicular Social Networks Vehicular Social Networks CRC Press DOI Publisher Url

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2010. Security in Wireless Sensor Networks Handbook of Information and Communication Security :513-552 Springer Berlin Heidelberg 9783642041167 DOI Publisher Url

Zhou B, Shi Q, Merabti M. 2010. A Novel Intrusion Detection System for Smart Space Advances in Digital Crime, Forensics, and Cyber Terrorism :307-333 IGI Global 9781605668369 DOI Publisher Url

Llewellyn‐Jones D, Merabti M, Shi Q, Askwith B, Reilly D. 2006. Improving Interoperation Security through Instrumentation and Analysis: A Framework and Case Study :225-236 Wiley 9781905209613 DOI Publisher Url

Zhang N, Shi Q. 1997. How to support secure electronic contract signing :253-264 DOI Publisher Url

Shi Q, Thang N. 1995. Experience in Application of Composable Security Properties IFIP Advances in Information and Communication Technology :223-236 Springer US 9781504129107 DOI Publisher Url

Top